Static task
static1
Behavioral task
behavioral1
Sample
e43a738c9c73307f45ca8774553ef5597709d108ae118b8d4fdda364b1b94e84.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e43a738c9c73307f45ca8774553ef5597709d108ae118b8d4fdda364b1b94e84.exe
Resource
win10v2004-20230703-en
General
-
Target
e43a738c9c73307f45ca8774553ef5597709d108ae118b8d4fdda364b1b94e84
-
Size
1.1MB
-
MD5
64c53bd640f954101e90e66e319d7ab0
-
SHA1
c1e891c455f5ebdbf98cfabe5767c0abef5dcd1d
-
SHA256
e43a738c9c73307f45ca8774553ef5597709d108ae118b8d4fdda364b1b94e84
-
SHA512
cccbd019f518de98dbdc4f4467a9cd740bc14d2c88fe2a809ea0a5d06ad68d6ed377272a522cc0540a20e91ed5ead6aeef84cf3dd7e328a0c9bb5bad4227c945
-
SSDEEP
24576:2mI3TEnF2I1K3Qbp9L7AHW7JQ65NM80ArGSNwZLIBwSX:SiKg9kW7JQ6xbrGmwlIuSX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e43a738c9c73307f45ca8774553ef5597709d108ae118b8d4fdda364b1b94e84
Files
-
e43a738c9c73307f45ca8774553ef5597709d108ae118b8d4fdda364b1b94e84.exe windows x86
63420503b1bfa04963f661b5a6cb86a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
kernel32
HeapFree
GetCurrentProcess
GetLastError
LoadLibraryW
HeapAlloc
GetProcAddress
LocalFree
GetProcessHeap
GetModuleHandleW
FreeLibrary
GetUserDefaultLangID
QueryDosDeviceW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
DeviceIoControl
LocalAlloc
GetSystemDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetThreadExecutionState
GetCurrentProcessId
GetDriveTypeW
OpenThread
TerminateThread
OutputDebugStringW
Sleep
MoveFileExW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
WriteConsoleW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetLocalTime
GetCurrentThreadId
CreateFileW
SetFilePointer
GetModuleFileNameW
WriteFile
CloseHandle
OpenProcess
WaitForSingleObject
GetTickCount
WaitForMultipleObjects
HeapSize
DecodePointer
GetProcessTimes
TryEnterCriticalSection
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
OpenEventW
CreateEventW
SetEvent
ResetEvent
GetComputerNameExW
GlobalAlloc
GlobalFree
SearchPathW
ExpandEnvironmentStringsW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
CreateMutexW
ReleaseMutex
OpenMutexW
WideCharToMultiByte
SwitchToThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetACP
MultiByteToWideChar
GetVolumeInformationW
GetDiskFreeSpaceW
ResumeThread
GetFileAttributesW
LoadLibraryA
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
SetFileTime
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
LoadLibraryExW
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
InterlockedExchangeAdd
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
FormatMessageW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetFileType
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
GetStringTypeW
HeapReAlloc
GetDateFormatW
GetTimeFormatW
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetParent
GetWindowThreadProcessId
GetWindow
FindWindowExW
IsWindowVisible
GetSystemMetrics
OpenDesktopW
CloseDesktop
ExitWindowsEx
FindWindowW
GetClassNameW
SwitchDesktop
GetDesktopWindow
WindowFromPoint
advapi32
SystemFunction036
ReportEventW
RegisterEventSourceW
DeregisterEventSource
EqualSid
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
GetTokenInformation
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
ole32
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerRegisterIfEx
NdrServerCall2
NdrAsyncServerCall
RpcServerUseProtseqEpW
RpcServerListen
imagehlp
ImageRemoveCertificate
ImageEnumerateCertificates
Sections
.text Size: 813KB - Virtual size: 812KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ